subject

Which of the following scenarios describes an IT professional using good methods to protect
passwords and system access of users? Check all
of the boxes that apply.
When setting up the e-mail program for each
employee's computer, the IT professional has
the employee enter his or her e-mail
password to protect privacy.
The IT professional posts a list of employee
usernames and passwords on the wall.
The IT professional views an employee's
browsing history while the employee is on a
fifteen-minute break.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 09:00
Create a cell reference in a formula by typing in the cell name or         a. right-clicking the cell. b. clicking the cell. c. clicking the column where the cell is located. d. clicking the row where the cell is located.
Answers: 1
question
Computers and Technology, 23.06.2019 13:30
Me ! evelyn is a manager in a retail unit. she wants to prepare a report on the projected profit for the next year. which function can she use? a. pmt b. round c. division d. what-if analysis
Answers: 2
question
Computers and Technology, 23.06.2019 21:50
Description: write function lastfirst() that takes one argument—a list of strings of the format "lastname, firstname" —and returns a list consisting of two lists: (a) a list of all the last names (b) a list of all the first names
Answers: 2
question
Computers and Technology, 24.06.2019 00:00
Visualizing a game of “tag” to remember the meaning of contagious
Answers: 3
You know the right answer?
Which of the following scenarios describes an IT professional using good methods to protect
p...
Questions
question
Mathematics, 25.07.2019 03:30
Questions on the website: 13722363